Infosecurity News

  1. North Korea's Lazarus Group Suspected of $100m Harmony Hack

    Elliptic used Tornado demixing techniques to trace the stolen funds to new Ethereum wallets

  2. DragonForce Malaysia Group Releases Windows LPE Exploit and Turns to Ransomware Tactics

    The primary objective of the attack was reportedly to get back at the Indian Government

  3. Info-Stealing Campaign Targeted Home Workers for Two Years

    ZuoRAT used in operation focused on SOHO routers

  4. Nevadan Arrested for Alleged $45m Metaverse Investment Fraud

    Scheme allegedly targeted over 10,000 victims

  5. Ukrainian Cops Bust Multimillion-Dollar Phishing Gang

    Thousands scammed by spoofed EU portals

  6. Cybersecurity Researchers Launch New Malware Hunting Tool YARAify

    The defensive tool is designed to scan suspicious files against a large repository of YARA rules

  7. New UnRAR Vulnerability Could Lead to Zimbra Webmail Hack

    Successful exploitation would give an attacker access to all emails on a compromised server

  8. Amazon Fixes High Severity Vulnerability in Amazon Photos Android App

    The vulnerability derived from a misconfiguration of one of the Photos app’s components

  9. Chinese Influence Op Tries to Undermine Western Rare Earth Firms

    Micro-targeting of local users a first for Beijing

  10. FBI: Beware Deepfakes Used to Apply for Remote Jobs

    Feds warn of fraudulent attempts to land work

  11. Ransomware Suspected in Wiltshire Farm Foods Attack

    Food manufacturer reveals system outage

  12. Nearly One Million Exposed Misconfigured Kubernetes Instances Could Cause Breaches

    Misconfiguration practices might make companies lucrative targets for threat actors

  13. Hackers Deploy Shadowpad Backdoor and Target Industrial Control Systems in Asia

    Telecommunications companies in Pakistan and Afghanistan and a port in Malaysia targeted

  14. Android Spyware 'Revive' Upgraded to Banking Trojan

    Dubbed ‘Revive’ because of its ability to automatically restart in case it stops working, the tool seems to be designed for persistent campaigns.

  15. Clear Rules Needed to Prevent Conflict and Struggle in Cyber Space, Says NCSC Chief

    NCSC chief executive Lindy Cameron explains that clear rules are needed to govern the use of cyber capabilities

  16. 97% Of UK Business Leaders Expect Quantum Computing to Disrupt Their Sectors

    The EY Quantum Readiness Survey 2022 contains the responses of 501 executive-level business leaders

  17. Stress and Burnout Could Lead to Exodus of CNI Cybersecurity Leaders

    95% of cybersecurity leaders are experiencing factors that would make them likely to leave their role in the next 12 months

  18. Unknown Hacker Steals $100m From California-Based Cryptocurrency Firm Harmony

    Harmony reassured customers the rest of funds held on its blockchain were safe

  19. Pro-Russian Hacker Group Killnet Hits Critical Government Websites in Lithuania

    The hacking group demanded Lithuania allow transit of goods to Kaliningrad

  20. Chinese Researchers Find Critical Security Flaws in CoDeSys Automation Software

    Vulnerabilities could allow attackers to gain unauthorized access to company resources or carry out denial-of-service attacks

What’s Hot on Infosecurity Magazine?